CFP Directory LogoCFP Directory
EventsSpeakersTalksOrganizationsFeaturesPricingWhy Us
Sign in

Company

  • About Us
  • Contact

Contact Info

Address:

13, Lorong Toh Aka

Georgetown 10100

Penang, Malaysia

Email:

info@cfp.directory

Website:

13thirtyseven.my

Business Hours

Monday - Friday:9:00 AM - 6:00 PM
Saturday:9:00 AM - 1:00 PM
Sunday:Closed

GMT+8 (Malaysia Standard Time)

© 2025 CFP Directory. All rights reserved.
13 Thirty Seven Sdn. Bhd. (1401538-A)
Privacy PolicyTerms of Service
Back to Speakers
Filipi   Pires

Filipi Pires

Head of Identity Threat Labs at Segura®

United States
English
Available Now
Virtual Events

10

Talks Delivered

8

Events Spoken At

4

Countries Visited

3

Years Speaking

10

Total Talks Given

About

I’ve been working as Head of Identity Threat Labs and Global Product Advocate at Segura®, Red Team Village Director, Senior Advisor Raices Cyber Academy, Founder of Red Team Community (Brazil and LATAM), AWS Community Builder, Snyk Ambassador, Application Security Specialist and Hacking is NOT a crime Advocate.


International Speaker at Security and New technologies events in many countries such as US (Black Hat & Defcon), Canada, France, Spain, Germany, Poland, Black Hat MEA - Middle-East - and others.


I’ve served as University Professor in Master Degree - Portugal and Graduation and MBA courses at Brazilian colleges, in addition, I'm Creator and Instructor of the Course - Malware Attack Types with Kill Chain Methodology (PentestMagazine), PowerShell and Windows for Red Teamers(PentestMagazine) and Malware Analysis - Fundamentals (HackerSec).

Speaking Topics & Expertise

Areas of Expertise

Malware Analysis
PDF Malicious
Identity Security
Cloud Security
Red Team
Threat Hunting

Presentation Types

Keynote
Workshop
Technical Talk and Panel

Audience Types

Cybersecurity
Managers
Developers
Hackers
CSO
CIO
CEO

Speaking History

2025

Machine Identity & Attack Path: The Danger of Misconfiguration

RSA Conference - Cloud Village
April 29, 2025
Talk

2024

Horusec: Keep your code safe during the development path

Black Hat MEA
November 28, 2024
Saudi Arabia
Talk

Cloud Security in Focus: Attack Techniques and Mitigation in AWS, Azure, GCP and OCI

Black Hat MEA
November 27, 2024
Saudi Arabia
Talk

Permission Prowess: Analyzing Attack Paths in Cloud Environments

Black Hat MEA
November 26, 2024
Saudi Arabia
Talk

Cloud Offensive Breaches: The Graph-Based Exploitation of Misconfigurations

DEF CON - Red Team Village
August 10, 2024
Las Vegas
Talk

Structural Insights: PDF Analysis for Detection and Defending agains Threats

DEF CON - La Villa
August 10, 2024
Las Vegas
Talk

Revealing Choke Points: Practical Tactics for Boosting Cloud Security

DEF CON - Cloud Village
August 10, 2024
Las Vegas
Talk

Horusec: Elevating Vulnerability Detection in your code.

Black Hat USA - Arsenal
August 8, 2024
Las Vegas

Cloud Attack: Dissecting Attack Paths with Graph‑Mode

BSides Las Vegas (BSidesLV) – 2024
August 7, 2024
Las Vegas

2021

Exploitation With Shell Reverse & Infection With PowerShell

HITBSecConf2021 - Amsterdam
May 27, 2021
Amsterdam
Tutorial
Conference
Malware Analysis
Windows Security

The purpose of this presentation, it was to execute several efficiency and detection tests in our lab environment protected with an endpoint solution, provided by CrowdStrike, this document brings the result of the defensive security analysis with an offensive mindset using reverse shell techniques to gain the access inside the victim’s machine and after that performing a Malware in VBS to infected the victim machine through use some scripts in PowerShell to call this malware, in our environment.


Regarding the test performed, the first objective it’s to simulate targeted attacks using a python script to obtain a panoramic view of the resilience presented by the solution, with regard to the efficiency in its detection by Signatures, NGAV and Machine Learning, running this script, the idea is to use the reverse shell technique to gain access on the victim’s machine. After the execute this attack, the the second objective consists in perfoming the PowerShell Script to run this script, to download a VBS Malicious file on the victim’s machine and execute itself, calling this malware provided through Malwares Bazaar by API request.


With the final product, the front responsible for the product will have an instrument capable of guiding a process of mitigation and / or correction, as well as optimized improvement, based on the criticality of risks.

View Slides & Materials

Connect

Website@FilipiPiresfilipi86LinkedIn Profile

Experience Level

expert